Essay about Security Objective Component

668 WordsJun 23, 20113 Pages
Security Objective Component I believe that the personnel security would be the best component for the article of “The Sanctuary Has Been Broken-and Burned” because from what I know of churches, I don’t believe that churches have any security cameras or any security at all. With the churches being free of any security, the church is left for any individual to be on the outside of the church without being watched by any surveillance so it would be easier to get away with vandalism or in some of the other criminal mischief that was talked about in the article. I believe that if churches were able to put up security cameras to catch the outside vandals, and even though it would not prevent all of the crimes, I believe that it would help…show more content…
The mall attracts a lot of people which is the one main reason why disturbed people go to the mall because there are a lot of people at the mall and in a lot of cases the gunman ends up ending their own life as well, and for whatever reason the gunman feels the need to prove a point, so they go to a location with a large population of people. All of the components of the seamless, interrogated security design are completely necessary in order to keep all of the personal information and security information such as alarm codes, and password information. Since each component holds its own responsibility, it makes it easier to make security issues a little easier to deal with since there are so many different fields of expertise in the criminal fields. I think as technology changes and grows so will the responsibility of each component, as well as possible new ways of targeting churches. I think that as times goes on and criminals continue to find new ways to vandalize, and that is why the interrogated security design is still very popular today (Clifford, 2004) References Arrigoni, Barbara. (March, 2009). Homeland1. Calif. County almost ready to trigger arson, bomb task force. Retrieved: November 2, 2010. From:
Open Document